plume-sig/zk-nullifier-sig
Implementation of PLUME: nullifier friendly signature scheme on ECDSA
RustMIT
Issues
- 1
ensure `Scalar::from_repr` is always `Some`
#111 opened by skaunov - 2
separate public and private inputs in API
#113 opened by skaunov - 0
move `verify` method to tests
#112 opened by skaunov - 6
`ProjectivePoint` should be avoided in interfaces
#86 opened by skaunov - 0
- 1
- 3
Introduce DST specific for the protocol!
#72 opened by skaunov - 0
Run circom tests in parallel
#105 opened by Divide-By-0 - 5
Add `sign` method to <./rust-k256>
#84 opened by skaunov - 6
Crates API and documentation
#67 opened by skaunov - 1
Add tests for wrapping `c` over $p$
#99 opened by skaunov - 10
- 2
`nullifier` is treated just like an EC point
#95 opened by skaunov - 3
<./rust-arkworks> is over generalized
#88 opened by skaunov - 4
`tests` in <./rust-k256> are confusing
#69 opened by skaunov - 0
Fix dependency compilation
#31 opened by Divide-By-0 - 2
<rust-arkworks> depends on a deprecated crate
#85 opened by skaunov - 0
Refactor `CryptoError`
#60 opened by skaunov - 0
Public key compressed twice
#14 opened by 0xbok - 0
minor error in comment describing `final_result`
#15 opened by 0xbok - 0
- 0
- 2
Upgrade `ark-ec` in <rust-arkworks> to "~0.4.0"
#43 opened by skaunov - 0
`sha256_preimage_bit_length` is a free signal
#13 opened by 0xbok - 0
Upgrade `k256` in _rust-k256_ to "~0.13.0"
#70 opened by skaunov - 0
Error handling in _rust_k256_
#63 opened by skaunov - 0
Are bad/malicious inputs tested?
#80 opened by skaunov - 0
autotest skips <circuits>
#38 opened by skaunov - 0
Refactor `verify_signals`
#61 opened by skaunov - 5
Consistent naming across different implementations
#22 opened by 0xbok - 0
Can use circom 2.1 feature for array constraints
#19 opened by 0xbok - 4
unnecessity of indifferentiability
#12 opened by weikengchen - 4
- 0
Incorrect comment on `encode_pt()`
#17 opened by 0xbok - 0
Add source reference in comments
#16 opened by 0xbok - 3
SHA-512 in `rust-arkworks`
#39 opened by skaunov - 0
320 bytes used to store Secp256k1 coordinate
#18 opened by 0xbok - 2
Remove `sha512` and dependencies
#20 opened by 0xbok - 2
- 9
Differential test to verify all implementations
#24 opened by 0xbok - 4
alternative security proof
#11 opened by weikengchen - 0
Different implementations use sha256 or sha512
#21 opened by 0xbok - 0
- 1
feature request: Proof verifier in Solidity
#8 opened by kumavis